×

Data processing and communications systems and methods for the efficient implementation of privacy by design

  • US 10,353,674 B2
  • Filed: 10/15/2018
  • Issued: 07/16/2019
  • Est. Priority Date: 06/10/2016
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented data processing method for demonstrating compliance with privacy-by-design practices, the method comprising:

  • automatically electronically analyzing, by one or more computer processors, computer code to determine one or more privacy-related attributes of the computer code, each of the privacy-related attributes indicating one or more types of personal information that the computer code collects or accesses;

    in response to determining that the computer code has a particular one of the one or more privacy-related attributes;

    (A) executing, by one or more computer processors, the steps of;

    (i) electronically displaying one or more prompts to one or more first individuals requesting that the one or more first individuals input information regarding the particular privacy-related attribute;

    (ii) receiving input information from the one or more first individuals regarding the particular privacy-related attribute; and

    (iii) communicating the information regarding the particular privacy-related attribute to one or more second individuals for use in conducting a first privacy assessment of the computer code;

    (B) changing, by one or more computer processors, an indicator associated with the code to indicate that the particular privacy-related attribute should be reviewed by one or more designated individuals; and

    (C) changing, by one or more computer processors, an indicator associated with the computer code to indicate that the computer code should be modified to not include the particular privacy-related attribute;

    receiving, by one or more computer processors, from the one or more second individuals, one or more revisions to the design of the computer code, the one or more revisions comprising one or more steps that facilitate the compliance of the computer code with one or more privacy standards;

    in response to receiving the one or more revisions, automatically initiating, by one or more computer processors, the generation of at least one task that is to be used in managing the design of the computer code, the at least one task comprising one or more tasks that, if completed, would individually or collectively result in the one or more revisions to the design of the computer code;

    receiving, by one or more computer processors, a notification that the at least one task has been completed;

    at least partially in response to receiving the notification that the at least one task has been completed, generating, by one or more computer processors, a second, updated privacy assessment for the computer code that reflects the fact that the one or more revisions have been completed; and

    generating, by one or more computer processors, a report listing the one or more revisions that have been completed.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×